Browse Definitions:
  • December 31, 2015 31 Dec'15

    Industrial Internet Consortium (IIC)

    The Industrial Internet Consortium (IIC) is a non-profit organization created for the promotion of open standards and interoperability for technologies used in industrial and machine-to-machine environments.  Continue Reading

  • December 30, 2015 30 Dec'15

    GNU project

    The GNU project is a mass collaborative initiative for the development of free software. Richard Stallman founded the project in 1978 at MIT.  Continue Reading

  • December 28, 2015 28 Dec'15

    slacktivism

    Slacktivism is taking action online in ways that involve little personal effort and have little immediate effect; the word is a portmanteau of slacker and activism.  Continue Reading

  • December 28, 2015 28 Dec'15

    dynamic voltage and frequency scaling (DVFS)

    Dynamic voltage and frequency scaling (DVFS) is the adjustment of power and speed settings on a computing device’s various processors, controller chips and peripheral devices to optimize resource allotment for tasks and maximize power-saving when ...  Continue Reading

  • December 27, 2015 27 Dec'15

    consumerism

    Consumerism is a cultural model that promotes the aquisition of goods, and especially the purchase of goods, as a vehicle for personal satisfaction and economic stimulation.  Continue Reading

  • December 25, 2015 25 Dec'15

    Twitter

    Twitter is a free social networking microblogging service that allows registered members to broadcast short posts called tweets.  Continue Reading

  • December 24, 2015 24 Dec'15

    LoRa Alliance

    The LoRa Alliance is an open, non-profit organization dedicated to promoting the interoperability and standardization of low-power wide area network (LPWAN) technologies to drive implementation of the Internet of Things (IoT).  Continue Reading

  • December 22, 2015 22 Dec'15

    Jargon File (New Hacker's Dictionary)

    The Jargon File is a compilation of computer-related slang that was first developed in 1975 by Raphael Finkel at Stanford University from sources including the Stanford and MIT AI Labs, Carnegie Mellon University and Worcester Polytechnic Institute.  Continue Reading

  • December 21, 2015 21 Dec'15

    cyberbullying

    Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.  Continue Reading

  • December 18, 2015 18 Dec'15

    widget

    In general, widget (pronounced WID-jit) is a term used to refer to any discrete object, usually of some mechanical nature and relatively small size, when it doesn't have a name, when you can't remember the name, or when you're talking about a class ...  Continue Reading

  • December 18, 2015 18 Dec'15

    beta test

    In software development, a beta test is the second phase of software testing in which a sampling of the intended audience tries the product out.  Continue Reading

  • December 18, 2015 18 Dec'15

    Google Docs

    Google Docs is a free Web-based application in which documents and spreadsheets can be created, edited and stored online.  Continue Reading

  • December 15, 2015 15 Dec'15

    digital wallet security

    Digital wallets are used for transactions involving both conventional and digital currencies, but because the latter work differently, they require different safeguards – or at least variations on traditional security measures.  Continue Reading

  • December 15, 2015 15 Dec'15

    stingray (IMSI catcher)

    A stingray is a mobile surveillance device also known as an IMSI (International Mobile Subscriber Identity) catcher or a cell site simulator. Stingray is sold to governmental and law enforcement sectors.  Continue Reading

  • December 15, 2015 15 Dec'15

    cryptocurrency

    A cryptocurrency is a digital medium of exchange that uses encryption to secure the processes involved in generating units and conducting transactions.  Continue Reading

  • December 15, 2015 15 Dec'15

    circular economy

    A circular economy is a system in which the potential use of goods and materials is optimized and their elements returned to the system at the end of their viable life cycle.  Continue Reading

  • December 11, 2015 11 Dec'15

    collaborative consumption

    Collaborative consumption is a new approach to consumer access of goods and services; elements of the model include bartering, sharing, gifting, lending and leasing or renting.  Continue Reading

  • December 11, 2015 11 Dec'15

    going dark

    Going dark describes a scenario in which communication appears to have ceased, but in reality has just moved from a public communication channel to a private, encrypted channel.  Continue Reading

  • December 10, 2015 10 Dec'15

    limited liability company (LLC)

    A limited liability company (LLC) is a hybrid unincorporated business structure that combines the pass-through tax model of partnerships and sole proprietorships with the protection of individual assets provided by the C corporation.  Continue Reading

  • December 10, 2015 10 Dec'15

    cooperative (co-op)

    A cooperative, often shortened to “co-op,” is a business that is owned and operated by and for the benefit of its members. A cooperative is formed when several people identify an unmet need.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • non-volatile memory (NVM)

    Non-volatile memory (NVMe) is a semiconductor technology that does not require a continuous power supply to retain the data or ...

  • hybrid hard drive (HHD)

    A hybrid hard drive (HHD), sometimes known as a solid-state hybrid drive (SSHD), is a mass storage device that combines a ...

  • USB flash drive

    A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close